Get a Pentest and security assessment of your IT network.

Cyber Security

Compromised Docker Hosts Use Shodan to Infect More Victims

Hackers are scanning for Docker hosts with exposed APIs to use them for cryptocurrency mining. Hackers use Docker images infected with Monero miners and scripts that make use of Shodan to find other vulnerable targets. The malicious Docker images are deployed automatically using a script which “checks hosts with publicly exposed APIs”” and “”uses Docker commands (POST /containers/create) to remotely create the malicious container”” The same malicious campaign was also observed by a security consultant and the Alibaba Cloud Security team.”

Source: https://www.bleepingcomputer.com/news/security/compromised-docker-hosts-use-shodan-to-infect-more-victims/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security